With the rapid development of the distributed network and communication, the Internet of Things (IoT) systems have been applied to all walks of life. Blockchain technology is one of the most popular research fields re...
With the rapid development of the distributed network and communication, the Internet of Things (IoT) systems have been applied to all walks of life. Blockchain technology is one of the most popular research fields recently, which can provide a reliable storage solution and solve information security issues for IoT systems. Transaction information is the most critical fundamental data in the blockchain systems, which needs to be verified to avoid being tempered with by malicious nodes in the process of transmission. With the exponential growth of the number of IoT devices, the limitations of the current storage structure put too much pressure on the system nodes. How to improve verification efficiency has become a key challenge. To alleviate this problem, this paper proposes a novel high-performance verification mechanism for data security protection in blockchain-based IoT systems. We design a new storage structure based on Huffman trunk tree (HTT), and conduct the quantitative analysis of transaction weights. Transactions are stored in full-featured devices in the form of Huffman Merkle tree (HMT), and only the content of HTT is saved in lightweight devices. Finally, the performance superiority of our mechanism is proved through theoretical analysis and experimental evaluation. In blockchain-based IoT systems, our mechanism significantly reduces the data transmission cost and computation overhead, effectively improving the efficiency of data verification.
The combination of Federated Learning (FL), Multimodal Large Language Models (MLLMs), and edge-cloud computing enables distributed and real-time data processing while preserving privacy across edge devices and cloud i...
详细信息
The inspection of wind turbine blades (WTBs) is crucial for ensuring their structural integrity and operational efficiency. Traditional inspection methods can be dangerous and inefficient, prompting the use of unmanne...
详细信息
In cloud computing, virtual machine(VM) placement plays a crucial role in data center(DC)management, as different ways of VM placement may require different system resources. As Cisco research reveals that virtualizat...
详细信息
In cloud computing, virtual machine(VM) placement plays a crucial role in data center(DC)management, as different ways of VM placement may require different system resources. As Cisco research reveals that virtualization of DC increases traffic within the DC and causes network bandwidth to become scarce resource, recent researches have been focusing on traffic-aware VM placement. However, previous traffic-aware VM placement schemes treat the VM placement as a static process in that they do not take into account the impact of the current placement decision on the subsequent placement. In this paper,we thus propose a novel online traffic-aware VM placement scheme. Our scheme views VM placement as a context-sensitive dynamic process in that the decision of every step of the placement is made aiming at helping the subsequent steps of placement to reduce the required network bandwidth in the long run. In our scheme, we consider not only inter-VM traffic but also the bandwidth constraint of a physical machine(PM) when making a VM placement decision. To realize our objective, we put those VMs with close end time in the same or close proximity PMs so that when the VMs are terminated, one can make enough room for the future arrivals so as to not only minimize the number of active PMs but also reduce networking costs. We conduct extensive simulations to verify the superiority of our scheme in terms of networking costs and energy consumption. Simulation results show that our scheme outperforms improved-best-fit-decreasing(IBFD) scheme, a revised best-fit version that takes inter-VM traffic into account, by 30%–40% on network cost under various scenarios. Our scheme also promises 10%–25% power savings compared with IBFD.
Despite the rapid growth of the ICT sector, there is a gap between it and STEM education, resulting in high dropout rates in computer science and engineering programs. This has led to many vacancies in the ICT job mar...
详细信息
ISBN:
(数字)9798331521165
ISBN:
(纸本)9798331521172
Despite the rapid growth of the ICT sector, there is a gap between it and STEM education, resulting in high dropout rates in computer science and engineering programs. This has led to many vacancies in the ICT job market. A major challenge is that traditional teaching methods fail to engage students in difficult and abstract STEM subjects like programming. To overcome this, innovative technology-enhanced learning solutions are needed. In the past, we created a Programming Learning Assistant System (PLAS) to help novice students learn programming. PLAS provides various types of exercises to develop code reading and writing skills at different levels. In this paper, we implement the gamification into PLAS to enhance students' understanding of programming concepts, boost their confidence, spark their interest in STEM fields, and increase engagement in the course through interactive and stimulating scenarios.
Remote communication solutions have grown in our globalized world. Combining this area with robotics, telepresence robots enable people to feel more present at distant locations and allow the operator to move freely. ...
Remote communication solutions have grown in our globalized world. Combining this area with robotics, telepresence robots enable people to feel more present at distant locations and allow the operator to move freely. Seemingly, there is no difference in perceived human affinity whether a person interacts with another person directly or through a telepresence robot, as a preliminary study demonstrates. In contrast to the preliminary study focusing on affinity towards a human interaction partner, the study in this paper deploys a humanoid robot as interaction partner. Hence, this work aims to explore if human affinity towards a humanoid robot varies if people interact with it directly or through a telepresence robot (so called mediated human-robot interaction). A Double 2 robot was used as telepresence robot and a Pepper as humanoid robot interlocutor. To measure participants’ mood, the Multidimensional Mood State Questionnaire was applied before and after interacting with Pepper. Also, human affinity was measured through a questionnaire. The results indicate that there is no significant difference regarding mood and perceived human affinity whether someone interacts with a humanoid robot in person or through a telepresence robot. However, participants were significantly more awake after interacting in person. Concluding, the field of mediated human-robot interaction can enable new successful use cases e.g. deploying a humanoid robot in a telepresence robot tour as a guide instead of a person. Thereby, neither attendees nor a human guide have to be onsite which is beneficial in health hazard crises such as the corona pandemic.
E-Voting systems play a vital role in various communities, aiming to enhance the efficiency, transparency, and citizen engagement in elections. However, as technology advances, ensuring the security and reliability of...
E-Voting systems play a vital role in various communities, aiming to enhance the efficiency, transparency, and citizen engagement in elections. However, as technology advances, ensuring the security and reliability of e-voting systems becomes profound. While researchers have explored the integration of blockchain technology to improve e-voting systems, there still are technical challenges, particularly regarding voters’ privacy, ballots’ confidentiality, and system performance. To address these challenges, we propose SvaVoting, an innovative blockchain-based e-voting scheme. SvaVoting utilizes the Borda counting method and the identity-based ring signature based on symmetric primitives to anonymously verify the validity of the voter’s identity and ballot format. In addition, we introduce secret sharing and a Cloud Service Provider (CSP) to conduct the final counting while preserving the privacy of the ballots. All users in the system can verify the results of CSP calculations, thereby meeting security goals such as correctness, unforgeability, anonymity and verifiability. The identity-based ring signature in our scheme provides 128-bit security, and even it can work in a quantum computing environment. Experimental results demonstrate that our solution significantly enhances the security and performance of e-voting systems, offering a practical path forward for future e-voting systems.
AUTOMATION has come a long way since the early days of mechanization,i.e.,the process of working exclusively by hand or using animals to work with *** rise of steam engines and water wheels represented the first gener...
详细信息
AUTOMATION has come a long way since the early days of mechanization,i.e.,the process of working exclusively by hand or using animals to work with *** rise of steam engines and water wheels represented the first generation of industry,which is now called Industry Citation:***,***,***,***,***,***,***,***,***,***,***,Q.-***,and F.-***,“Automation 5.0:The key to systems intelligence and Industry 5.0,”IEEE/CAA ***,vol.11,no.8,pp.1723-1727,Aug.2024.
Unspent Transaction Output (UTXO) is part of the transaction data set, which represents the digital cryptocurrency asset in transaction-based blockchain systems. The data management capability, storage method and occu...
Unspent Transaction Output (UTXO) is part of the transaction data set, which represents the digital cryptocurrency asset in transaction-based blockchain systems. The data management capability, storage method and occupied space of UTXOs will greatly affect the running efficiency and the verification performance of blockchain systems. Especially, with the popularity of blockchain technology, the relevant UTXO data sets have been growing, and all the stored data can no longer be almost completely stored in memory. How should the UTXO transaction data be stored and managed at this time, it is an urgent issue to be solved in bitcoin-like blockchain systems. This paper provides a blockchain transaction data management optimization mechanism based on multi-partitioning. First, we analyze the influencing factors of transactions through real blockchain data. The proposed method can evaluate the time interval and transaction frequency factors, and use the received information to realize the efficient transaction data storage. In our design, UTXOs with lower likelihood to be used in new transactions will be stored in the disk, and the other UTXOs with higher likelihood to be used in new generated transactions should be stored in the cache. This approach aims to minimize memory consumption for the transaction data sets, accelerate UTXO access time during block verification, and ultimately decrease the overall time required for verification, leading to efficient UTXO transaction data management. Finally, the effectiveness of the proposed optimization mechanism is verified through theoretical analysis and simulation experiments, and the UXTO access time has been reduced compared with state-of-the-art methods.
Heart failure (HF) is a complex syndrome that is affected by many factors and causes. It is crucial to early recognize the disease subtypes and the unidentified clinical pathways that give rise to it. Machine learning...
详细信息
暂无评论